The document discusses computer security in the digital era. It covers several topics:
1) Operating systems and how security features like updates, antivirus software, and encryption help protect systems.
2) Malware threats like viruses, trojans, and ransomware, and how antivirus software detects and removes them.
3) Internet security risks from data theft, identity theft, and child safety issues; and steps to secure browsers and chat apps.
4) Social media security risks like phishing, identity theft, and privacy leaks; and tips to use strong passwords and privacy settings.
3. Security
▪ Tujuan
▪ Mencegah kehilangan/kerusakan data
▪ Mencegah pencurian/pembocoran data
▪ Penanganan insiden
▪ Sumber masalah
▪ Bencana alam
▪ Hacker, pencuri, virus
▪ Diri sendiri
3
9. Pengenalan: data
▪ Data adalah kumpulan fakta:
personal / organizational
▪ Daftar nomor telepon
▪ Hasil rekaman CCTV
▪ Transaksi kartu kredit
▪ Foto-foto
▪ Data yang sudah diolah dan
memiliki makna substansial
disebut informasi
7
10. Pengenalan: ancaman
▪ Ancaman (threats) pada data:
kehilangan/kerusakan data, pencurian data
(kebocoran rahasia) karena
▪ Bencana alam
▪ Orang lain (hacker, pencuri, malware, dll)
▪ Diri sendiri
8
11. Pengenalan: resiko
▪ Financial loss
▪ Unavailability of resources
▪ Identity theft & fraud
▪ Loss of trust
▪ Data loss / theft
▪ Misuse of computer resources
9
12. Pengenalan: keamanan
▪ Tujuan: mencegah data hilang, data rusak &
menangani insiden
▪ Elemen keamanan informasi
▪ Confidentiality
▪ Authenticity
▪ Integrity
▪ Availability
▪ Nonrepudiation
10
18. OS
▪ Fungsi sistem operasi:
▪ Mengontrol I/O
▪ Mengelola file dan folder
▪ Menangani resources
▪ Mengamankan perangkat dan data
▪ Aktivitas pengamanan OS:
▪ Update patch
▪ Penggunaan antivirus & firewall
▪ Enkripsi
▪ Konfigurasi akun user
▪ Monitoring proses, services, dll
▪ Backup & recovery
16
19. OS: Fitur Penting
▪ Windows 10
▪ Windows security (firewall, defender)
▪ Family options
▪ Backup options (system image, file history)
▪ Encryption (EFS, BitLocker)
▪ Jump list
▪ UAC
▪ Mac OS X
▪ Parental Control
▪ Time Machine
▪ Encryption (FileVault)
▪ Automatic login
17
34. Internet: keamanan anak
▪ Ancaman keamanan anak di Internet:
▪ Cyberbullying
▪ Pornografi
▪ Stealth site
▪ Misdirected search
▪ Grooming
▪ Ancaman di media sosial
▪ Spam
▪ Ancaman di chat rooms
32
35. Internet: keamanan anak
▪ Langkah-langkah melindungi anak dari masalah
online:
▪ Pencegahan: pendidikan, monitoring, limitasi
▪ Kenali ciri-ciri anak yang mengalami masalah online
▪ Latih anak agar melaporkan hal-hal mencurigakan
▪ Apa yang harus dilakukan jika anak menjadi
korban:
▪ Abaikan semua komunikasi dari predator
▪ Hentikan aktivitas di situs/media tersebut
▪ Blokir akun-akun yang terkait
▪ Jika perlu: hapus akun anak
33
39. Medsos
▪ Media sosial: situs/aplikasi online untuk
terhubung, dan berbagi informasi dengan orang-
orang lain.
▪ Setiap orang memiliki profil:
▪ Nama
▪ Informasi pribadi (hobi, agama ,dll)
▪ Kontak (email, no hp, dll)
▪ Foto, video, dll
▪ Almamater, kantor, komunitas, dll
37
40. Medsos: ancaman
▪ Phishing
▪ Identity theft
▪ Malware
▪ Site flaws
▪ URL Spoofing
▪ Clickjacking /
Likejacking
▪ Social engineering
▪ Direct approach
▪ Indirect approach
38
41. Medsos: tips
▪ Tips:
▪ Password
▪ Iklan / link
▪ Friend request
▪ Informasi yang diposting
▪ Pengaturan privasi
▪ Geotagging
39
45. Cloud
▪ Based on user
▪ Private
▪ Public
▪ Community
▪ Hybrid
▪ Based on service
▪ IaaS
▪ PaaS
▪ SaaS
43
46. Cloud
▪ Advantages
▪ Flexible
▪ Cost effective
▪ Portable
▪ Privacy issues
▪ Data ownership
▪ Data location
▪ Data migration
▪ Data permanency
▪ Threats
▪ Data breach
▪ Data loss
▪ Account hacking
▪ Disgruntled employee
▪ Technology loopholes
▪ Shared space
44
47. Cloud
▪ Mitigation
▪ Backup data
▪ Update backup
▪ Strong password
▪ 2 Factor authentication
▪ Encrypt
▪ Discipline behavior
▪ Avoid upload sensitive data
▪ Choosing cloud
▪ How much space?
▪ How much cost?
▪ Customer service
▪ Customer review
▪ Security
▪ Data loss plan
▪ Location
▪ Up time warranty
45